Kalitorify – Transparent Proxy Through Tor

Kalitorify – Transparent Proxy Through Tor

What is Kalitorify?

Kalitorify is a shell script for Kali Linux which use iptables settings for transparent proxy through Tor, the program also allows you to perform various checks like checking the external IP, or if Tor has been configured correctly.

What is a Transparent Proxy?

Also known as an intercepting proxy, inline proxy, or forced proxy, a transparent proxy intercepts normal communication at the network layer without requiring any special client configuration. Clients need not be aware of the existence of the proxy. A transparent proxy is normally located between the client and the Internet, with the proxy performing some of the functions of a gateway or router. With kalitorify you can redirect all traffic of your Kali Linux operating system through Tor. How cool is that?!

What makes this special?

This uses iptables to transparently torify a system. This affords comparatively strong leak protection, but it is not a substitute for virtualized torification applications such as Whonix, or TorVM. Applications can still learn your computer’s hostname, MAC address, serial number, timezone, etc. and those with root privileges can disable the firewall entirely. In other words, transparent torification with iptables protects against accidental connections and DNS leaks by misconfigured software, it is not sufficient to protect against malware or software with serious security vulnerabilities.

Getting Started

First, we have to install dependencies, using the commands:

sudo apt-get install tor

In addition to this:

sudo apt update && sudo apt full-upgrade -y

If you haven’t cloned already, do it using:

git clone https://github.com/brainfucksec/kalitorify

Now navigate to the directory where it is saved, in my case:

cd kalitorify/

Now, run the make install command:

sudo make install

Now make sure kalitorify.sh has executable permissions, if not, grant them


Now run this command:

./kalitorify.sh -t

Now press enter!

It should display your new public IP address.

To see your public IP, you can use the command:

./kalitorify.sh -i

Test that your DNS isn’t leaking, by going to dnsleaktest.com

The charm of this script is that you can pass all your system through the tor relay. Without any DNS leaks. But do remember, Tor doesn’t provide 100% anonymity.

Thanks for reading.


Liked it? Take a second to support Alexis on Patreon!
Share this post

Leave a Reply

Your email address will not be published. Required fields are marked *